標題: Titlebook: Applications and Techniques in Information Security; 13th International C Srikanth Prabhu,Shiva Raj Pokhrel,Gang Li Conference proceedings [打印本頁] 作者: Iodine 時間: 2025-3-21 16:24
書目名稱Applications and Techniques in Information Security影響因子(影響力)
書目名稱Applications and Techniques in Information Security影響因子(影響力)學科排名
書目名稱Applications and Techniques in Information Security網(wǎng)絡公開度
書目名稱Applications and Techniques in Information Security網(wǎng)絡公開度學科排名
書目名稱Applications and Techniques in Information Security被引頻次
書目名稱Applications and Techniques in Information Security被引頻次學科排名
書目名稱Applications and Techniques in Information Security年度引用
書目名稱Applications and Techniques in Information Security年度引用學科排名
書目名稱Applications and Techniques in Information Security讀者反饋
書目名稱Applications and Techniques in Information Security讀者反饋學科排名
作者: Comedienne 時間: 2025-3-21 20:42 作者: Ballerina 時間: 2025-3-22 01:51
https://doi.org/10.1007/978-3-540-75544-9 where an attacker can tamper the message for polynomial number of times. In this work, we propose a construction of continuously non-malleable code from authenticated encryption in 2-split-state model. Our construction provides security against polynomial number of tampering attacks and non-malleab作者: 完全 時間: 2025-3-22 05:33
Emissive Materials - Nanomaterialsith its unique design. In order to increase the profitability of crypto-jacking, attackers are expanding their reach to browsers, network devices, and even Internet of Things (IoT) devices. Browsers, for example, are a particularly enticing target for attackers looking to obtain sensitive data from 作者: 細胞膜 時間: 2025-3-22 09:26
https://doi.org/10.1007/978-94-010-2044-2 for predicting distinct faces using the Decision Tree classifier model. The ensemble learning model also had an accuracy of 85%, which could potentially be improved by using more photos for comparison. In future work, the method could be applied to 3D images, which is currently an open challenge in作者: 有偏見 時間: 2025-3-22 14:45 作者: savage 時間: 2025-3-22 19:59 作者: CRACY 時間: 2025-3-23 01:04 作者: DEVIL 時間: 2025-3-23 01:29 作者: 淡紫色花 時間: 2025-3-23 09:05
https://doi.org/10.1007/978-3-662-44150-3lanning and implementation. Organizations are spending large amounts of funding to become more integrated and secure but need more time or money to update software..This paper demonstrates the deployment of data layers on Medical Data. Patient records are kept in a remote server and are accessed onl作者: 怕失去錢 時間: 2025-3-23 13:16 作者: 細頸瓶 時間: 2025-3-23 14:53 作者: 上釉彩 時間: 2025-3-23 21:47
Continuously Non-malleable Codes from?Authenticated Encryptions in?2-Split-State Model where an attacker can tamper the message for polynomial number of times. In this work, we propose a construction of continuously non-malleable code from authenticated encryption in 2-split-state model. Our construction provides security against polynomial number of tampering attacks and non-malleab作者: addition 時間: 2025-3-23 22:42
Variants of Crypto-Jacking Attacks and Their Detection Techniquesith its unique design. In order to increase the profitability of crypto-jacking, attackers are expanding their reach to browsers, network devices, and even Internet of Things (IoT) devices. Browsers, for example, are a particularly enticing target for attackers looking to obtain sensitive data from 作者: 勉強 時間: 2025-3-24 03:07 作者: 冒號 時間: 2025-3-24 09:09
Analysis of?Classification Algorithms for?Predicting Parkinson’s Disease and?Applications in?the?Fieient Boosting, XGBoost, Random Forest, and Extra Trees Classification are used to estimate whether the individual is normal or affected by Parkinson’s disease. According to this study, the ensemble method Gradient Boosting classification algorithm outperformed other classification algorithms in term作者: needle 時間: 2025-3-24 14:37
Optimization of?Secured Cluster Based Charging Dynamics and?Scheduling of?EV Using Deep RNN, at CS, vehicle time scheduling is done using the DRNN approach, considering delay-based distance computation. When compared to the stochastic Particle Swarm Optimization (PSO) algorithm for routing, the proposed DRNN-SSD routing algorithm optimizes delay and traffic congestion significantly achiev作者: Psa617 時間: 2025-3-24 18:31 作者: BROW 時間: 2025-3-24 19:12
Detection of Android Ransomware Using Machine Learning Approachictim’s data and demands for a ransom amount for the decryption key. The present Android ransomware research is deficient in key components and relies on supervised machine-learning techniques. However, these techniques have several drawbacks and early detection and recognition of ransomware in andr作者: collagenase 時間: 2025-3-25 00:43 作者: cartilage 時間: 2025-3-25 06:34
Applications and Techniques in Information Security13th International C作者: 易發(fā)怒 時間: 2025-3-25 09:47
Jane Austen: Life and Background,ncryption time by 50% as compared with Blowfish algorithm. The value calculated for avalanche of the Modified Blowfish is 48.5% and the Blowfish achieved 47.14%. Matlab is used in the research work for performing encryption of the data.作者: NICHE 時間: 2025-3-25 12:08
Modified Blowfish Encryption Algorithm for?Wireless Body Area Networkncryption time by 50% as compared with Blowfish algorithm. The value calculated for avalanche of the Modified Blowfish is 48.5% and the Blowfish achieved 47.14%. Matlab is used in the research work for performing encryption of the data.作者: 食物 時間: 2025-3-25 18:14 作者: 凹槽 時間: 2025-3-25 23:34
Andrew C. Grimsdale,Klaus Müllend. Naive Bayes Classifier was used as a Machine Learning algorithm, TextBlob is used as the Lexicon-based approach, and the deep-learning algorithm used is BiLSTM. It was observed that BiLSTM model outperforms the other two models with an F1-score of 0.895, accuracy of 0.896, precision of 0.899, and recall of 0.891.作者: 熱烈的歡迎 時間: 2025-3-26 02:24 作者: MUTED 時間: 2025-3-26 05:11 作者: 充滿裝飾 時間: 2025-3-26 11:28
EyeEncrypt: A Cyber-Secured Framework for?Retinal Image Segmentationges have several applications in the field of medicine, which include the early detection of various diseases such as glaucoma. Characteristics intrinsic to retinal images make the vessel detection process difficult. Our proposed framework EyeEncrypt, aids in effective medical image segmentation on a secure integrated framework.作者: GIBE 時間: 2025-3-26 15:19
1865-0929 , ATIS 2022, held in Manipal, India, December 30–31, 2022..The 23 full papers included in this book were carefully reviewed and selected from 121 submissions. They were organized in topical sections as follows: Privacy and Security, Advances in Machine Learning, Cloud, IoT and Computing Technologies作者: 細胞膜 時間: 2025-3-26 18:49 作者: acheon 時間: 2025-3-26 23:25
Husserl and the Problem of Ontology,sed recommendation, considering interest of a group of people is proposed here. The system also ensures privacy of the users by generating hash code of the interest provided by the group. The proposed scheme performs well with a prediction accuracy of 83% for a maximum of four users with TMDB database.作者: Delude 時間: 2025-3-27 05:06 作者: Arable 時間: 2025-3-27 05:52 作者: Popcorn 時間: 2025-3-27 10:08 作者: 拾落穗 時間: 2025-3-27 14:29
https://doi.org/10.1007/978-3-642-58682-8ional diffusion layer. In this work, we propose two different MixColumns like matrices to the AES block cipher that secures the cipher against Differential Fault Analysis attacks. The attack complexity is increased to . with our proposed matrix.作者: 可轉變 時間: 2025-3-27 19:11
The G?ttingen Period (1915–1933) cyber attacks by analysing the data logs and compared with the non-federated learning techniques on the same data. It is very evident from the experiment that Federated Learning is very effective in detecting these attacks by preserving the privacy of the victim organisations/systems.作者: 喚醒 時間: 2025-3-28 00:04
A Better MixColumns Matrix to?AES Against Differential Fault Analysis Attackional diffusion layer. In this work, we propose two different MixColumns like matrices to the AES block cipher that secures the cipher against Differential Fault Analysis attacks. The attack complexity is increased to . with our proposed matrix.作者: Common-Migraine 時間: 2025-3-28 02:34
Intrusion Detection Using Federated Learning cyber attacks by analysing the data logs and compared with the non-federated learning techniques on the same data. It is very evident from the experiment that Federated Learning is very effective in detecting these attacks by preserving the privacy of the victim organisations/systems.作者: 期滿 時間: 2025-3-28 09:49
https://doi.org/10.1007/978-3-540-75544-9tributes will prompt privacy leakage. Choosing private data from a list of attributes is decided by the publisher, and it undoubtedly changes from dataset to dataset. The need for dynamically choosing and informing systems about a quasi and a non-quasi attribute remains a challenging task. Presently作者: BLINK 時間: 2025-3-28 11:49
https://doi.org/10.1007/978-3-540-75544-9of tampering attack is to recover the key by altering some regions of the memory. Such attack may also appear when the device is stolen or viruses has been introduced. Non-malleable codes are used to protect the secret information from tampering attacks. The secret key can be encoded using non-malle作者: Condescending 時間: 2025-3-28 15:24 作者: ingrate 時間: 2025-3-28 20:23 作者: 做事過頭 時間: 2025-3-29 02:00 作者: chisel 時間: 2025-3-29 05:08
Emissive Materials - NanomaterialsSince 2017 it has been widely used and was previously the most serious threat to network security. Because of the number of malicious actors has increased there is a recent increase in the value of cryptocurrencies. The availability of bit-coin mining software has grown significantly. Mining for cry作者: parallelism 時間: 2025-3-29 08:33 作者: 重疊 時間: 2025-3-29 13:46
Jane Austen: Life and Background, are used to monitor and measure vital parameters, process them, transfer them to the wearable device controller. If an attacker tries to alter the information, the confidentiality of the data is lost and also it could prove fatal to the person to whom the data belongs to. The paper focuses on achie作者: 錯 時間: 2025-3-29 17:32 作者: Intellectual 時間: 2025-3-29 23:20
Husserl and the Problem of Ontology, for a family with people involving different age groups and different interests. Therefore a content based filtering scheme with cosine similarity based recommendation, considering interest of a group of people is proposed here. The system also ensures privacy of the users by generating hash code o作者: 紋章 時間: 2025-3-30 03:37
https://doi.org/10.1007/978-94-010-2044-2poses face recognition and verification of two-dimensional(2D) images by a feature extraction algorithm which involves identifying anthropological facial feature points and calculating the Euclidean Distance (ED) between these points (ED-FFP) as these distances, if required can be used as an objecti作者: 顛簸地移動 時間: 2025-3-30 04:07
The G?ttingen Period (1915–1933)nges in the structural level also open new dimensions that are susceptible to cyber-attacks. One of the efficient methods to tackle these situations is to apply intelligence to the systems and detect abnormal behaviours. As privacy plays a vital role, here Federated Learning method is used to detect作者: CURL 時間: 2025-3-30 12:01 作者: Feature 時間: 2025-3-30 15:18 作者: 煩躁的女人 時間: 2025-3-30 20:30
Memories and Legacies of Emmy Noether,ity Index(WQI) for river water is calculated to check the water quality. The Central Pollution Control Board (CPCB), an Indian organization, built several monitoring stations to keep an eye on the values of the physicochemical parameters under consideration. The Ganga river’s water quality index wil作者: 大吃大喝 時間: 2025-3-30 22:54 作者: Keratectomy 時間: 2025-3-31 04:02 作者: 笨拙的我 時間: 2025-3-31 05:47 作者: Thyroxine 時間: 2025-3-31 10:17
978-981-99-2263-5The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Singapor作者: Dislocation 時間: 2025-3-31 14:05 作者: Adornment 時間: 2025-3-31 18:00 作者: 喚醒 時間: 2025-4-1 00:01
Communications in Computer and Information Sciencehttp://image.papertrans.cn/a/image/159232.jpg作者: GLEAN 時間: 2025-4-1 04:27
Reinforcement Technique for?Classifying Quasi and?Non-quasi Attributes for?Privacy Preservation and?tributes will prompt privacy leakage. Choosing private data from a list of attributes is decided by the publisher, and it undoubtedly changes from dataset to dataset. The need for dynamically choosing and informing systems about a quasi and a non-quasi attribute remains a challenging task. Presently